{"title":"Static Voltage Stability Analysis of Large Bus Power System","authors":"Swati S. Pande, Sagar T. Telrandhe, S. D. Naik","doi":"10.1109/ICCMC.2019.8819697","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819697","url":null,"abstract":"A study on large bus power system is performed using Power System Analysis Toolbox (PSAT). MATLAB offers flexible simulation environment for static voltage stability analysis using PSAT. This paper describes static voltage stability analysis of American Electric Power Service Corporation network which comprises of 30 bus system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Panoramic View of Cloud Storage Security Attacks: an Insight and Security Approaches","authors":"E. Daniel, S. Durga, S. Seetha","doi":"10.1109/ICCMC.2019.8819801","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819801","url":null,"abstract":"Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Naresh, A. Akshith, CH. Sai Sri Harsha, M. Sai Kumar
{"title":"Visiting Center Based Portable Emissary Approach for Data Gathering in Wireless Sensor Networks","authors":"M. Naresh, A. Akshith, CH. Sai Sri Harsha, M. Sai Kumar","doi":"10.1109/ICCMC.2019.8819746","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819746","url":null,"abstract":"Wireless sensor networks (WSNs) have been lately recognized as a trust-worthy innovation for many applications, for example, defence, ambient and physiology-monitoring. A WSN includes stationing of hundreds or thousands of minor sensor hubs that communicate remotely with each other to detect explicit activities in a field of intrigue. The way towards gathering tactile information from sensor hubs and returning back to the handling unit (e.g., sink hub) is called data gathering. In network-oriented gathering, single-hop strategy involves the information being transmitted specifically from the source hub to the sink; which includes high power utilization and transmission from source hub to sink through multi-hops with other system hub as the intermediate hub or nodes. This procedure prompts data congestion, increased dormancy and high energy utilization, especially for hubs situated close to the sink, because of the gigantic measure of information stream. To mitigate these issues, a portable emissary (PE) was proposed in order to give an alternative approach for customary information gathering procedures in WSNs. Furthermore, visiting center based approach (VCBPE) is proposed with the goal that versatile hubs need not venture out to each hub for information gathering.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare
{"title":"Simulation and Analysis of Series Active Filter Using AC-AC Converter for Mitigation of Sag","authors":"Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare","doi":"10.1109/ICCMC.2019.8819629","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819629","url":null,"abstract":"This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman
{"title":"A new approach to ROI based image compression using simple sliding window spatial filter","authors":"Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman","doi":"10.1109/ICCMC.2019.8819690","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819690","url":null,"abstract":"By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Tolerance in VLSI Circuit with Reducing Rollback Cost using FSM","authors":"Gadde Doondi Srinath, M. Samson","doi":"10.1109/ICCMC.2019.8819739","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819739","url":null,"abstract":"In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey
{"title":"A Survey on Fundamental of Wireless Sensor Network with Various Issues in Optimization","authors":"Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey","doi":"10.1109/ICCMC.2019.8819833","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819833","url":null,"abstract":"Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of acoustical models of GMM-HMM based for speech recognition in Hindi using PocketSphinx","authors":"Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta","doi":"10.1109/ICCMC.2019.8819747","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819747","url":null,"abstract":"Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation","authors":"T. K. Babu, C. D. Guruprakash","doi":"10.1109/ICCMC.2019.8819848","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819848","url":null,"abstract":"Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja
{"title":"A Comparative Study on Parsing in Natural Language Processing","authors":"Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja","doi":"10.1109/ICCMC.2019.8819687","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819687","url":null,"abstract":"The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}